|Listed in category:
Have one to sell?

Mastering Identity and Access Management with Microsoft Azure : Empower Users by

US $75.00
ApproximatelyPHP 4,180.50
Condition:
Very Good
Close to like new with only minor shelf wear.
Breathe easy. Free returns.
Shipping:
Free USPS Ground Advantage®.
Located in: Groton, Massachusetts, United States
Delivery:
Estimated between Thu, 12 Jun and Wed, 18 Jun to 94104
Delivery time is estimated using our proprietary method which is based on the buyer's proximity to the item location, the shipping service selected, the seller's shipping history, and other factors. Delivery times may vary, especially during peak periods.
Returns:
30 days return. Seller pays for return shipping.
Coverage:
Read item description or contact seller for details. See all detailsSee all details on coverage
(Not eligible for eBay purchase protection programmes)
Seller assumes all responsibility for this listing.
eBay item number:285633354316
Last updated on Jan 24, 2024 10:05:17 PHTView all revisionsView all revisions

Item specifics

Condition
Very Good
A book that has been read but is in excellent condition. No obvious damage to the cover, with the dust jacket included for hard covers. No missing or damaged pages, no creases or tears, and no underlining/highlighting of text or writing in the margins. May be very minimal identifying marks on the inside cover. Very minimal wear and tear. See all condition definitionsopens in a new window or tab
Seller Notes
“Close to like new with only minor shelf wear.”
ISBN
9781789132304

About this product

Product Identifiers

Publisher
Packt Publishing, The Limited
ISBN-10
1789132304
ISBN-13
9781789132304
eBay Product ID (ePID)
14038651957

Product Key Features

Number of Pages
698 Pages
Publication Name
Mastering Identity and Access Management with Microsoft Azure : Empower Users by Managing and Protecting Identities and Data, 2nd Edition
Language
English
Publication Year
2019
Subject
Software Development & Engineering / General, Cloud Computing, Security / General, System Administration / Disaster & Recovery, Security / Networking
Type
Textbook
Author
Jochen Nickel
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Length
3.6 in
Item Width
3 in

Additional Product Features

Edition Number
2
Intended Audience
Trade
Table Of Content
Table of Contents Building and Managing Azure Active Directory Understanding Identity Synchronization Exploring Advanced Synchronization Concepts Monitoring Your Identity Bridge Configuring and Managing Identity Protection Managing Authentication Protocols Deploying Solutions on Azure AD and ADFS Using the Azure AD App Proxy and the Web Application Proxy Deploying Additional Applications on Azure AD Exploring Azure AD Identity Services Creating Identity Life Cycle Management on Azure Creating a New Security Culture Identifying and Detecting Sensitive Data Understanding Encryption Key Management Strategies Configuring Azure Information Protection Solutions Azure Information Protection Development Overview
Synopsis
Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS) solution Over 40 playbooks to support your learning process with practical guidelines Book Description Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies. What you will learn Apply technical descriptions to your business needs and deployments Manage cloud-only, simple, and complex hybrid environments Apply correct and efficient monitoring and identity protection strategies Design and deploy custom Identity and access management solutions Build a complete identity and access management life cycle Understand authentication and application publishing mechanisms Use and understand the most crucial identity synchronization scenarios Implement a suitable information protection strategy Who this book is for This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up-to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions., With the digital transformation many organizations are currently going through, they realize that the statement " Identity is the new control plane and new perimeter" is not just fiction, it's reality. This book is a crisp and clear, hands-on guide with project scenarios tailored to help you solve real challenges in the field of Identity and ..., Master powerful strategies to acquire and analyze evidence from real-life scenarios Key Features A straightforward guide to address the roadblocks face when doing mobile forensics Simplify mobile forensics using the right mix of methods, techniques, and tools Get valuable advice to put you in the mindset of a forensic professional, regardless of your career level or experience Book Description Investigating digital media is impossible without forensic tools. Dealing with complex forensic problems requires the use of dedicated tools, and even more importantly, the right strategies. In this book, you'll learn strategies and methods to deal with information stored on smartphones and tablets and see how to put the right tools to work. We begin by helping you understand the concept of mobile devices as a source of valuable evidence. Throughout this book, you will explore strategies and """"""""plays"""""""" and decide when to use each technique. We cover important techniques such as seizing techniques to shield the device, and acquisition techniques including physical acquisition (via a USB connection), logical acquisition via data backups, over-the-air acquisition. We also explore cloud analysis, evidence discovery and data analysis, tools for mobile forensics, and tools to help you discover and analyze evidence. By the end of the book, you will have a better understanding of the tools and methods used to deal with the challenges of acquiring, preserving, and extracting evidence stored on smartphones, tablets, and the cloud. What You Will Learn Understand the challenges of mobile forensics Grasp how to properly deal with digital evidence Explore the types of evidence available on iOS, Android, Windows, and BlackBerry mobile devices Know what forensic outcome to expect under given circumstances Deduce when and how to apply physical, logical, over-the-air, or low-level (advanced) acquisition methods Get in-depth knowledge of the different acquisition methods for all major mobile platforms Discover important mobile acquisition tools and techniques for all of the major platforms Who This Book Is For This book is for forensic analysts and law enforcement and IT security officers who have to deal with digital evidence as part of their daily job. Some basic familiarity with digital forensics is assumed, but no experience with mobile forensics is required.

Item description from the seller

About this seller

BWO Fly

99.5% positive feedback31K items sold

Joined Feb 2004
Usually responds within 24 hours
Fly fishing, fly tying, tungsten beads - I only sell stuff that I use and I am passionate about!

Detailed Seller Ratings

Average for the last 12 months
Accurate description
5.0
Reasonable shipping cost
4.8
Shipping speed
5.0
Communication
5.0

Seller feedback (9,238)

All ratings
Positive
Neutral
Negative